1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
7

It’s illegal to hack into a system without authorization, but is it ethical for a gray-hat to hack into a system if the intent i

s to help it become more secure? Some experts consider gray-hat hackers an essential part of securing the Internet because they often expose vulnerabilities before they’re discovered by the security community. What do you consider the dividing line?
Computers and Technology
1 answer:
oksian1 [2.3K]3 years ago
8 0

Answer:

Some hackers are smart about there hacking .. others have a a plot but didnt test there theory

Explanation:

You might be interested in
Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2 GB. The PC has an Intel
egoroff_w [7]

Answer:

Option A is correct.

Explanation:

He attaches the second 1 Gigabyte 240 pins DIMM for his system the overall RAM will be up around 2 Gigabytes. System is fitted with Intel Core 2 Dual 3-GHz cpu as well as three 240 pins DIMM ports on the motherboard. Transforms on a system, just 1 Gigabytes of RAM is seen through that RAM count.

Thus, the following issue is much more probably to be the failure to correctly grab that RAM.

5 0
4 years ago
What do you understand by main document and data source
Oksana_A [137]

Answer:

The data source is a document, spreadsheet or database that contains personalized information such as names, addresses, and phone numbers. The Main Document can be a Form Letter, Labels, Email, or Directory.

<h2>Please mark me as brainliest</h2>

6 0
3 years ago
Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage de
Katen [24]

Answer:

<u><em>C</em></u>

Explanation:

Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.

Hope this helped, and sorry if I didn't answer in time.

6 0
3 years ago
The qwerty keyboard is the most common layout of keys on a keyboard.
vagabundo [1.1K]
The qwerty keyboard is the most common keyboard.
6 0
4 years ago
Read 2 more answers
How do you change your password on this? This isn’t really a “Question” but....
MissTica
You go to edit profile and press the change password button.  click on profile pic
5 0
4 years ago
Read 2 more answers
Other questions:
  • Hen pointing to a tool on the ribbon, a ______ appears, displaying information about the tool.
    7·1 answer
  • If a given router can connect to at most k networks, how many routers, r, are required to connect n networks? write an equation
    7·1 answer
  • Fill in the blanks.
    6·2 answers
  • Explain the nature of documents that can be suitable for mergin
    12·1 answer
  • Which unique address is a 128-bit address written in hexadecimal?
    13·1 answer
  • What is computer hacking? describe some examples
    6·1 answer
  • Defining a(n) ______________ of an object is called instantiation.
    12·1 answer
  • Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
    12·1 answer
  • Anyone know how to fix black screen of death on computer​
    6·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!